{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T19:20:39Z","timestamp":1776712839306,"version":"3.51.2"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319398136","type":"print"},{"value":"9783319398143","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39814-3_13","type":"book-chapter","created":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T04:24:34Z","timestamp":1464755074000},"page":"132-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating Reputation of Internet Entities"],"prefix":"10.1007","author":[{"given":"V\u00e1clav","family":"Barto\u0161","sequence":"first","affiliation":[]},{"given":"Jan","family":"Ko\u0159enek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"13_CR1","unstructured":"Barto\u0161, V.: Analysis of alerts reported to Warden. Technical report 1\/2016, CESNET, February 2016"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Barto\u0161, V., \u017d\u00e1dn\u00edk, M.: An analysis of correlations of intrusion alerts in anNREN. In: 19th International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), pp. 305\u2013309. IEEE, December 2014","DOI":"10.1109\/CAMAD.2014.7033255"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TNET.2011.2157699","volume":"20","author":"CA Shue","year":"2012","unstructured":"Shue, C.A., et al.: Abnormally malicious autonomous systems and their internet connectivity. IEEE\/ACM Trans. Netw. 20(1), 220\u2013230 (2012)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"13_CR4","unstructured":"Cambridge English Dictionary: reputation. \n                      http:\/\/dictionary.cambridge.org\/dictionary\/english\/reputation\n                      \n                    . Accessed January 14, 2016"},{"key":"13_CR5","unstructured":"CESNET: Warden \u2013 alert sharing system. \n                      https:\/\/wardenw.cesnet.cz\/"},{"key":"13_CR6","unstructured":"ENISA: Standards and tools for exchange and processing of actionable information, November 2014"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Gokcen, Y., Foroushani, V., Heywood, A.: Can we identify NAT behavior by analyzing traffic flows? In: Security and Privacy Workshops (SPW), pp. 132\u2013139. IEEE, May 2014","DOI":"10.1109\/SPW.2014.28"},{"key":"13_CR8","unstructured":"Merriam-Webster Dictionary: Reputation. \n                      http:\/\/www.merriam-webster.com\/dictionary\/reputation\n                      \n                    . Accessed on January 14, 2016"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Moreira Moura, G.C., Sadre, R., Pras, A.: Internet bad neighborhoods temporal behavior. In: Network Operations and Management Symposium (NOMS), pp. 1\u20139. IEEE, May 2014","DOI":"10.1109\/NOMS.2014.6838306"},{"key":"13_CR10","unstructured":"Moreira Moura, G.C.: Internet bad neighborhoods. Ph.D. thesis, University of Twente, Enschede. \n                      http:\/\/doc.utwente.nl\/84507\/"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Moreira Moura, G.C., et al.: How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation. In: 14th International Conference on Networking. IFIP, May 2015","DOI":"10.1109\/IFIPNetworking.2015.7145335"},{"issue":"1","key":"13_CR12","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1145\/2637364.2592034","volume":"42","author":"L Vu","year":"2014","unstructured":"Vu, L., Turaga, D., Parthasarathy, S.: Impact of DHCP churn on network characterization. SIGMETRICS Perform. Eval. Rev. 42(1), 587\u2013588 (2014)","journal-title":"SIGMETRICS Perform. Eval. Rev."}],"container-title":["Lecture Notes in Computer Science","Management and Security in the Age of Hyperconnectivity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39814-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:05:10Z","timestamp":1591401910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39814-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319398136","9783319398143"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39814-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}